CIS 210 WK 5 Midterm Exam - All Possible Questions
MULTIPLE CHOICE
1. In launching a new information system, the greatest risk occurs when a company ____.
a. begins by outlining its business models and identifying possible IT solutions
b. tries to decide how the system will be implemented before determining what the system is
supposed to do
c. considers implementation options after having a clear set of objectives
d. all of the above
2. ____ software controls the flow of data, provides data security, and manages network
operations.
a. Enterprise c. Application
b. System d. Legacy
3. Examples of company-wide applications, called ____, include order processing systems,
payroll systems, and company communications networks.
a. enterprise applications c. operating applications
b. network operating systems (NOS) d. legacy systems
4. Over 40 years ago, a concept called Moore's Law accurately predicted that computer
processing power would double about every ____.
a. 2 months c. 24 months
b. 12 months d. 48 months
5. When planning an information system, a company must consider how a new system will
interface with older systems, which are called ____.
a. enterprise applications c. operating applications
b. network operating systems (NOS) d. legacy systems
6. For complex operations, analysts apply computer-based modeling tools that use a standard
language called ____.

27. In the ____, like that shown in the accompanying figure, the result of each phase, which is
called a deliverable or end product, flows sequentially into the next phase in the SDLC.
a. interactive model c. waterfall model
b. requirements model d. object model
28. In the model of the SDLC shown in the accompanying figure, the ____ usually begins with a
formal request to the IT department, called a systems request, which describes problems or
desired changes in an information system or a business process.
a. systems design phase c. systems support and security phase
b. systems planning phase d. systems analysis phase
29. In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to
build a logical model of the new system.
a. systems analysis phase c. systems design phase
b. systems implementation phase d. systems support and security phase
30. In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to
create a physical model that will satisfy all documented requirements for the system.
a. systems implementation phase c. systems analysis phase
b. systems planning phase d. systems design phase
31. In the model of the SDLC shown in the accompanying figure, during ____, the new system is
constructed.
a. systems planning c. systems design
b. systems support and security d. systems implementation
32. In the model of the SDLC shown in the accompanying figure, during ____, the IT staff
maintains, enhances, and protects the system.
a. systems support and security c. systems analysis
b. systems implementation d. systems planning

33. Whereas structured analysis treats processes and data as separate components, ____
combines data and the processes that act on the data into things called objects.
a. the MSF c. RUP
b. the SDLC d. O-O
34. In object-oriented programming, an object is a member of a(n) ____, which is a collection of
similar objects.
a. property c. message
b. class d. instance
35. In object-oriented design, built-in processes called ____ can change an objectâ&#x20AC;&#x2122;s properties.
a. methods c. attributes
b. functions d. features
36. Agile methods typically use a(n) ____model, which represents a series of iterations based on
user feedback.
a. gradual c. spiral
b. extreme d. evaluative
37. When building an information system, all of the following basic guidelines should be
considered except ____.
a. stick to an overall development plan
b. identify major milestones for project review and assessment
c. provide accurate and reliable cost and benefit information
d. ensure that users are not involved in the development process
38. The ____ group typically provides leadership and overall guidance, but the systems
themselves are developed by teams consisting of users, managers, and IT staff members.
a. Web support c. systems support
b. application development d. database administration
39. ____ provides vital protection and maintenance services for system software and hardware,
including enterprise computing systems, networks, transaction processing systems, and corporate
IT infrastructure.
a. User support c. Systems support and security
b. Database administration d. Network administration
40. A systems analyst needs ____.
a. solid technical knowledge and good analytical ability

b. strong oral and written communication skills
c. an understanding of business operations and processes
d. all of the above
More Questions are Included